Is www.wellresearchedreviews.com Safe?

Suspicious website

Website security score

42%
WOT’s security score is based on our unique technology and community expert reviews.
Is this website claimed?
No
Community reviews
★ 2.5
WOT’s algorithm
49%
Child Safety
N/A

What does the community say?

Leave a review

How would you rate this website from 1 to 5?
starempty-star
starempty-star
starempty-star
starempty-star
starempty-star
Share your feedback and help the communityReviews must consist of at least 15 charactersChoose the tags that best describe this website
Malware or Viruses
Poor customer service
Phishing
Scam
Potentially illegal
Misleading or unethical
Privacy Risk
Suspicious
Hate, discrimination
Spam
Potential unwanted program
Ads / Pop-ups
Adult Content
Incidental nudity
Gruesome or shocking
Cancel
Post Review
2.5
starstarhalf-starempty-starempty-star

Based on 3 reviews

Sort by:
Newest
On my recent call, a Well Researched Reviews (WRR) customer service rep offered incomplete and/or seemingly evasive answers to points I raised about its review of WebWatcher (WW)-- 1. WRR gave a glowing review to web activity-monitoring software product WW, placing industry stalwarts like Cybersitter and NetNanny on almost a second-tier of inferior competitors. Yet, WRR used an arbitrary and unsystematic system for its rating-- the equivalent of saying "Take our word for it". Not only do professional software reviewers writing for and/or employed by industry-based publications typically refuse to gush positive (or negative) over any product, but they take pains to explain a systematic basis for their evaluations. In stark contrast, WRR offered a very limited number of arbitrarily-selected points of evaluation, to the exclusion of all others, as a basis for its glowing praise. WRR's one "negative" was to state WW does not run on a Mac computer-- a doubtful negative to most readers using Windows machines. 2. According to the customer service rep, WRR has no affiliation with and gets no subsidy or consideration from publishers of WW. "Nothing I know of," she insisted. Actually, she may have noticed I wanted a definitive answer, not what she claimed to know-- or not know. 3. I specifically asked the same rep certain obvious security questions, and a paraphrased excerpt of the exchange follows-- First, I observed that WRR praised WW for its ability to monitor remotely multiple computers, recording screenshots and every keystroke on the remotely monitored computer. However, since black hats (hackers) also use this technique routinely to steal passwords and bank account numbers via key loggers and other malware, what is placed on the remotely monitored computer-- a keylogger? The rep made no answer. Second, I questioned the WW claim that the WW remote monitor capability is "highly undetectable"-- "http://www.wellresearchedreviews.com/computer-monitoring/WebWatcher.html#features". Specifically, I asked what is to prevent a remotely-monitored computer from detecting WW's key-logger caliber software. Many very capable root-kit and virus detection products are now in use-- indeed, professional security companies may already have distributed a signature to detect characteristic activity and software used by WW. The customer service rep replied WW uses SSL and port 443, essentially a statement that all traffic on this port is "secure" according to the SSL definition-- but in no way offered me a coherent reply to my question about detection by IDS systems used on the remotely-monitored computer. Later, in a second try, the rep said WW uses "exclusions" to modify the IDS system in use-- in effect tinkering with whatever IDS alarm system it recognizes to "blind" it to WW. If this much is true, then two points apply-- (1) WW works only if it senses accurately (and reliably) the IDS system in place on the remotely-monitored computer AND can change the remote system's IDS list of known malware and keylogger signatures-- almost impossible to do with most such systems, since (otherwise) all malware could wave to the IDS guard in the guardshack and shout, "I'm OK!" (2) The use of exclusions means there IS a recognizable signature to WW presence, rendering beside-the-point whether WW admits its monitoring involves actual dropping of keylogger software on the remote machine. 4. Finally, a very serious question-- what if a black hat sold his keylogger software ("XYZ" ) on the open market, claiming it is a "remote monitor", instead of a keylogger? Conveniently for the black hat, all XYZ keylogger functions remain fully intact, and the black hat is actually paid by the buyer for the privilege of introducing the XYZ keylogger to the buyer's own computer, as well as remotely-monitored systems. This is the question every buyer must consider before believing claims of certain software reviewers.
1
They make reviews and recommendation for monitoring and security solutions rated by WOT yellow or red like: WebWatcher, SpectorPro, SpyAgent, NetNanny, CyberSitter, ContentProtect. They try to look like an trustworthy source of security software, but they definitely aren't!
1
Most of the software they recommend is rated yellow or red.... but these guys are rated green? Seems kind of inconsistent to me. Can someone clear this up for everyone? I'd like to know: which is it? Are these guys not trustworthy, or are the sites they recommend trustworthy?
2
Check If You’ve Been CompromisedConnect with Google to scan your browsing history.
Connect with Google
As seen on
By signing in, you agree to data collection and use as described in our Terms Of Use and Privacy Policy
alternative-placeholder

About WOT

We reviewed more than 2 Million website and counting. WOT is a lightweight extension designed to help you browse quickly and securely. It will clean your browser, speed it up, and protect your private information.

Is this your website?

Claim your website to access WOT’s business tools and connect with your customers.
Claim This Website
This site uses cookies for analytics and personalization. By continuing, you agree to our cookie policy.
Accept